User Manual

Table Of Contents
13
49.6.2 MLD Configuration Task List ............................................................................................. 49-25
49.6.3 MLD Typical Application .................................................................................................... 49-26
49.6.4 MLD Troubleshooting Help................................................................................................ 49-27
49.7 MLD SNOOPING ............................................................................................................................ 49-27
49.7.1 Introduction to MLD Snooping........................................................................................... 49-27
49.7.2 MLD Snooping Configuration Task.................................................................................... 49-28
49.7.3 MLD Snooping Examples .................................................................................................. 49-29
49.7.4 MLD Snooping Troubleshooting ........................................................................................ 49-32
CHAPTER 50 MULTICAST VLAN .................................................................................50-1
50.1 INTRODUCTIONS TO MULTICAST VLAN ............................................................................................. 50-1
50.2 MULTICAST VLAN CONFIGURATION TASK LIST ................................................................................. 50-1
50.3 MULTICAST VLAN EXAMPLES .......................................................................................................... 50-2
CHAPTER 51 ACL CONFIGURATION ..........................................................................51-1
51.1 INTRODUCTION TO ACL.................................................................................................................... 51-1
51.1.1 Access-list ........................................................................................................................... 51-1
51.1.2 Access-group ...................................................................................................................... 51-1
51.1.3 Access-list Action and Global Default Action....................................................................... 51-1
51.2 ACL CONFIGURATION TASK LIST ...................................................................................................... 51-2
51.3 ACL EXAMPLE .............................................................................................................................. 51-18
51.4 ACL TROUBLESHOOTING ............................................................................................................... 51-22
CHAPTER 52 802.1X CONFIGURATION ......................................................................52-1
52.1 INTRODUCTION TO 802.1X ................................................................................................................ 52-1
52.1.1 The Authentication Structure of 802.1x ............................................................................... 52-1
52.1.2 The Work Mechanism of 802.1x ......................................................................................... 52-3
52.1.3 The Encapsulation of EAPOL Messages ............................................................................ 52-3
52.1.4 The Encapsulation of EAP Attributes .................................................................................. 52-5
52.1.5 Web Authentication Proxy based on 802.1x ....................................................................... 52-5
52.1.6 The Extension and Optimization of 802.1x ....................................................................... 52-10
52.1.7 The Features of VLAN Allocation ...................................................................................... 52-11
52.2 802.1X CONFIGURATION TASK LIST ................................................................................................ 52-12
52.3 802.1X APPLICATION EXAMPLE ...................................................................................................... 52-14
52.3.1 Examples of Guest Vlan Applications ............................................................................... 52-14
52.3.2 Examples of IPv4 Radius Applications .............................................................................. 52-17
52.3.3 Examples of IPv6 Radius Application ............................................................................... 52-18
52.4 802.1X TROUBLESHOOTING ........................................................................................................... 52-19
CHAPTER 53 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP
CONFIGURATION ..........................................................................................................53-1
53.1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP .................... 53-1